Real time location system
First Claim
1. A method comprising:
- with a data hosting system, receiving a beacon identifier and a location of a beacon associated with the beacon identifier from an individual location monitoring system, the individual location monitoring system comprising a first computer system operated by a first entity, wherein the location of the beacon is determined by the first computer system, and the data hosting system comprises a second computer system and is operated by a second entity;
with the data hosting system, determining an identity of a monitored individual associated with the beacon identifier based at least in part on the beacon identifier;
with the data hosting system, associating the location of the beacon with the identity of the monitored individual;
with the data hosting system, receiving a request from a device associated with a requesting individual for the location of the monitored individual, the request including authentication credentials associated with the monitored individual;
with the data hosting system, verifying that the requesting individual is authorized to access data about the monitored individual based at least in part on the authentication credentials in the request; and
providing the location of the monitored individual to the device associated with the requesting individual;
wherein the identity of the monitored individual is stored on the data hosting system and is inaccessible to the individual location monitoring system operated by the first entity.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes receiving a beacon identifier and a location of a beacon associated with the beacon identifier from an individual location monitoring system operated by a first entity. The method further includes, with a data hosting system operated by a second entity, determining an identity of a monitored individual associated with the beacon identifier, associating the location of the beacon with the identity of the monitored individual, and receiving a request for the location of the monitored individual including authentication credentials. The method further includes, with the data hosting system, determining if the requesting individual is authorized to access data about the monitored individual and, if the requesting individual is authorized to access the data, providing the location of the monitored individual to the device, wherein the identity of the monitored individual is stored on the data hosting system and is inaccessible to the individual location monitoring system.
-
Citations
20 Claims
-
1. A method comprising:
-
with a data hosting system, receiving a beacon identifier and a location of a beacon associated with the beacon identifier from an individual location monitoring system, the individual location monitoring system comprising a first computer system operated by a first entity, wherein the location of the beacon is determined by the first computer system, and the data hosting system comprises a second computer system and is operated by a second entity; with the data hosting system, determining an identity of a monitored individual associated with the beacon identifier based at least in part on the beacon identifier; with the data hosting system, associating the location of the beacon with the identity of the monitored individual; with the data hosting system, receiving a request from a device associated with a requesting individual for the location of the monitored individual, the request including authentication credentials associated with the monitored individual; with the data hosting system, verifying that the requesting individual is authorized to access data about the monitored individual based at least in part on the authentication credentials in the request; and providing the location of the monitored individual to the device associated with the requesting individual; wherein the identity of the monitored individual is stored on the data hosting system and is inaccessible to the individual location monitoring system operated by the first entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 20)
-
-
13. A system, comprising:
-
one or more beacons located within a defined area, the one or more beacons being configured to transmit beacon data packets including a beacon identifier and data associated with a location of the beacon from which the beacon data packet is transmitted; a plurality of transceiver nodes located within the defined area, the transceiver nodes being configured, upon receipt of a beacon data packet, to transmit a transceiver node data packet including a transceiver node identifier, the beacon identifier of the beacon from which the beacon data packet was received, and the data associated with the location of the beacon from which the beacon data packet was received; a first computer system comprising one or more processors and memory coupled thereto, the first computer system implementing an individual location monitoring system comprising; a location determination tool to determine the location of the beacon based at least in part on the data associated with the location of the beacon; and a first communication interface to transmit the determined location and the beacon identifier to a data hosting system; and a second computer system comprising one or more processors and memory coupled thereto, the second computer system implementing a data hosting system comprising; a second communication interface to receive a request from a device associated with a requesting individual for the location of a monitored individual; an association tool to determine the identity of the monitored individual associated with the beacon identifier of the beacon from which the beacon data packet was received, and associate the location of the beacon with the identity of the monitored individual; and an authentication tool to verify that a device associated with the requesting individual is authorized to receive the location of the beacon; wherein the second communication interface is configured to transmit the location of the beacon to the device associated with the requesting individual. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification